Zengyu Cai

According to our database1, Zengyu Cai authored at least 23 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
1D CNN and BiSRU based Intrusion Detection Method for Industrial Control Systems.
J. Inf. Sci. Eng., January, 2024

2023
Migration and Energy Aware Network Traffic Prediction Method Based on LSTM in NFV Environment.
KSII Trans. Internet Inf. Syst., March, 2023

An improved AODV routing algorithm based on energy consumption for Ad Hoc networks.
J. Comput. Methods Sci. Eng., 2023

Echo State Network-Based Content Prediction for Mobile Edge Caching Networks.
Int. J. Inf. Technol. Web Eng., 2023

2022
K -Anonymous Based Anti-Positioning Security Strategy in Mobile Networks.
J. Inf. Sci. Eng., 2022

Multi-level Cross-attention Siamese Network For Visual Object Tracking.
KSII Trans. Internet Inf. Syst., 2022

A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA.
Int. J. Digit. Crime Forensics, 2022

An Unhealthy Webpage Discovery System Based on Convolutional Neural Network.
Int. J. Digit. Crime Forensics, 2022

2021
Blockchain-Enabled Privacy-Preserving Location Sharing Scheme for LBSNs.
Mob. Inf. Syst., 2021

Design and implementation of a cloud encryption transmission scheme supporting integrity verification.
Int. J. Embed. Syst., 2021

Design and Implementation of Intrusion Detection System Based on Neural Network.
Proceedings of the Data Science, 2021

2020
Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA.
Int. J. Perform. Eng., 2020

An Adaptive Traffic-Aware Migration Algorithm Selection Framework in Live Migration of Multiple Virtual Machines.
Int. J. Perform. Eng., 2020

A BD Group Key Negotiation Protocol based on Clustering Technology.
Int. J. Perform. Eng., 2020

An identity-based integrity verification scheme for cloud storage in 5G environment.
Int. J. Comput. Appl. Technol., 2020

A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Toward Pattern and Preference-Aware Travel Route Recommendation over Location-Based Social Networks.
J. Inf. Sci. Eng., 2019

An authenticated hierarchical asymmetric group key agreement protocol based on identity.
Int. J. Embed. Syst., 2019

2017
An Anomaly Detection Method Based on Normalized Mutual Information Feature Selection and Quantum Wavelet Neural Network.
Wirel. Pers. Commun., 2017

2011
A Physical Topology-Aware Chord Model based on ACO.
J. Comput., 2011

An Improved Approximation Algorithm for a Class of Batch Scheduling Problems.
Proceedings of the Advanced Intelligent Computing - 7th International Conference, 2011

2009
A Method of In-Depth-Defense for Network Security Based on Immunity Principles.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

A Model of Intrusion Prevention Base on Immune.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...